متابعة
Chunhua Jin
Chunhua Jin
淮阴工学院
بريد إلكتروني تم التحقق منه على hyit.edu.cn
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
A blockchain-based medical data sharing and protection scheme
X Liu, Z Wang, C Jin, F Li, G Li
IEEE Access 7, 118943-118953, 2019
2492019
Practical access control for sensor networks in the context of the Internet of Things
F Li, Y Han, C Jin
Computer Communications 89, 154-164, 2016
1372016
Secure and efficient data transmission in the Internet of Things
F Li, Z Zheng, C Jin
Telecommunication Systems 62, 111-122, 2016
952016
Cost-effective and anonymous access control for wireless body area networks
F Li, Y Han, C Jin
IEEE Systems Journal 12 (1), 747-758, 2016
772016
Certificateless online/offline signcryption for the Internet of Things
F Li, Y Han, C Jin
Wireless Networks 23, 145-158, 2017
682017
A secure ECC-based RFID mutual authentication protocol to enhance patient medication safety
C Jin, C Xu, X Zhang, F Li
Journal of medical systems 40, 1-6, 2016
612016
Provably secure heterogeneous access control scheme for wireless body area network
AA Omala, AS Mbandu, KD Mutiria, C Jin, F Li
Journal of Medical Systems 42, 1-14, 2018
582018
A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography
C Jin, C Xu, X Zhang, J Zhao
Journal of medical systems 39, 1-8, 2015
562015
Practical signcryption for secure communication of wireless sensor networks
F Li, Y Han, C Jin
Wireless Personal Communications 89, 1391-1412, 2016
542016
Identity-based deniable authentication for ad hoc networks
F Li, P Xiong, C Jin
Computing 96 (9), 843-853, 2014
462014
An improved two-layer authentication scheme for wireless body area networks
X Liu, C Jin, F Li
Journal of medical systems 42, 1-14, 2018
382018
Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme
X Zhang, C Xu, C Jin, R Xie, J Zhao
Future Generation Computer Systems 36, 180-186, 2014
382014
An identity-based proxy re-encryption for data deduplication in cloud
G Kan, C Jin, H Zhu, Y Xu, N Liu
Journal of systems architecture 121, 102332, 2021
252021
Efficient forward secure identity-based shorter signature from lattice
X Zhang, C Xu, C Jin, R Xie
Computers & Electrical Engineering 40 (6), 1963-1971, 2014
252014
Identity-based user authenticated key agreement protocol for multi-server environment with anonymity
A Hassan, AA Omala, M Ali, C Jin, F Li
Mobile Networks and Applications 24, 890-902, 2019
222019
An efficient heterogeneous signcryption for smart grid
C Jin, G Chen, C Yu, J Shan, J Zhao, Y Jin
PloS one 13 (12), e0208311, 2018
222018
Identity-based deniable authenticated encryption and its application to e-mail system
F Li, Z Zheng, C Jin
Telecommunication Systems 62, 625-639, 2016
202016
Certificateless deniably authenticated encryption and its application to e-voting system
E Ahene, C Jin, F Li
Telecommunication Systems 70 (3), 417-434, 2019
172019
Secure fuzzy identity-based public verification for cloud storage
Y Xu, C Jin, W Qin, J Shan, Y Jin
Journal of Systems Architecture 128, 102558, 2022
162022
A heterogeneous user authentication and key establishment for mobile client–server environment
F Li, J Wang, Y Zhou, C Jin, SKH Islam
Wireless Networks 26, 913-924, 2020
142020
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20